If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Now, I have no real interest in the flaming between chsh and tiger shark. But there is no way that a post such as el-half's deserves ap's of the green variety. It posted no useful content and just continued the flame war. People often bitch that most of this board is a popularity contest....thank you for proving them right.

I'd suggest if you're (you meaning anyone who reads this) gonna respond with anything negative in the future at least provide some relevant information to back you up. Flaming for flaming's sake is stupid, at least in a forum where people are trying to get useful information.

"When I get a little money I buy books; and if any is left I buy food and clothes." - Erasmus
"There is no programming language, no matter how structured, that will prevent programmers from writing bad programs." - L. Flon
"Mischief my ass, you are an unethical moron." - chshBlog of X

Tiger Shark: Great tutorial, useful information (in my eye's) and an interesting topic for people who deal with Networking as well as Information Security (such as myself ). Greenies for you my friend.

Originally posted here by phishphreek80 Do you ever have anything nice to say?

Plenty.

It seems that you always spend more time trying to find something wrong with a thread/post than you do adding something of value to a thread/post.

I was giving Tiger Shark kudos.

But hey, we're all entitiled to our opinions...

Indeed.

Originally posted by Tiger SharkHmmm.... "TCP Flags: Their use and abuse" explained what the typical flags are for and how, with knowledge of the information returned can be, in part, used to footprint a system or in some cases deny it service.

Actually, it was a somewhat inaccurate half-effort at best. You sort of mention things can be done without explaining how, nor do you explain the differences between implementations. That is neither here nor there, the point is it's not really security related.

"TTL and traceroute: The forgotten hack"..... Let's see, traceroute is an implementation, if you will, of the TTL in an IP packet that began life as a hack. It explains how and why it works and goes on to hint at the fact that the principle can be used to enumerate resources beind a firewall that doesn't allow ICMP Echo_Requests through to the internal devices but might allow ICMP Time_Exceeded packets out.

Enumeration is not hacking. At any rate, you are admitting here it is an implementation specific issue.

Both are undoubtedly security related. Maybe you don't understand the difference between "Security" and "Other".

Neither tutorial discusses in any way how to improve the security of your systems. You discussed nothing in this tutorial of how to defeat such "hacks" (which are really just simplistic enumeration). IMO the line between security and other in this instance has something to do with whether there is any discussion on how to improve the security of your computer. This discusses nothing related to that, and therefore belongs in other IMO.

While you are here I'll give you a little update from the last thread you tried to screw up with your pathetic "I'm so bloody superior" attitude. Faqt has progressed rather well in her quest. She has quite thoroughly enumerated the applicable resources on her network and has already received half her extra credits for managing to do so. Her midterms got a little in the way but I understand she is working again on the issue. She has done this all on her own with only conceptual suggestions and encouragement from me, (and maybe others), through PM's so as to avoid your unconstructive drivel.

Funny thing, Faqt wrote me directly via pm and cleared up the matter. This is irrelevant to the issue at hand.

Chris Shepherd
The Nelson-Shepherd cutoff: The point at which you realise someone is an idiot while trying to help them.
\"Well as far as the spelling, I speak fluently both your native languages. Do you even can try spell mine ?\" -- Failed Insult
Is your whole family retarded, or did they just catch it from you?

I'd suggest if you're (you meaning anyone who reads this) gonna respond with anything negative in the future at least provide some relevant information to back you up. Flaming for flaming's sake is stupid, at least in a forum where people are trying to get useful information.

It is obvious my post was lame, but chsh's comment on Tiger Shark's article was exactly the same, only stated more fancy.

The above sentences are produced by the propaganda and indoctrination of people manipulating my mind since 1987, hence, I cannot be held responsible for this post\'s content - me

The part of my post that you quoted was just as much for chsh as it was for you, mjk, and anyone else. It would appear that chsh has at least read it since his next post has more information to back up his opinions on the matter.

"When I get a little money I buy books; and if any is left I buy food and clothes." - Erasmus
"There is no programming language, no matter how structured, that will prevent programmers from writing bad programs." - L. Flon
"Mischief my ass, you are an unethical moron." - chshBlog of X